
Big Java, Binder Ready Version: Early Objects
6th Edition
ISBN: 9781119056447
Author: Cay S. Horstmann
Publisher: WILEY
expand_more
expand_more
format_list_bulleted
Question
Chapter 9, Problem 13PE
Program Plan Intro
Implementing BetterRectangle class
Program plan:
Filename: “BetterRectangle.java”
This snippet of code is used to implement the class “BetterRectangle”. In the code,
- Import the required packages.
- Define the class “BetterRectangle”.
- Define a constructor “BetterRectangle ()”.
- Call the method “setLocation()”.
- Call the method “setSize()”.
- Define the method “getPerimeter()”.
- Return the calculated value.
- Define the method “getarea()”.
- Return the calculated value.
- Define a constructor “BetterRectangle ()”.
Filename: “BetterRectangleTester.java”
This snippet of code is used to implement the class “BetterRectangleTester”. In the code,
- Import the required packages.
- Define the class “BetterRectangleTester”.
- Define a method “main()”.
- Create an object “kls”.
- Set the value of “methods”.
- Set the value of “construcors”.
- Set the value of “ctorOK”.
- Set the value of “getPerimeterOK”.
- Set the value of “getAreaOK”.
- Set the value of “superOK”.
- Print the value of “kls”.
- Print the expected value of “kls”.
- Print the value of “ctorOK”.
- Print the expected value of “ctorOK”.
- Print the value of “getPerimeterOK”.
- Print the expected value of “getPerimeterOK”.
- Print the value of “getAreaOK”.
- Print the expected value of “getAreaOK”.
- Create an object “o”.
- If the condition is true,
- Set the object “o”
- Print the x value.
- Print the y value.
- Print the width.
- Print the height.
- If the object “o” is not equal to “null”.
- Print the area using “actual”.
- Print the expected value.
- Print the perimeter using “actual”.
- Print the expected value.
- Define a method “main()”.
Expert Solution & Answer

Want to see the full answer?
Check out a sample textbook solution
Students have asked these similar questions
In java
KeanPerson
#keanld:int
#keanEmail:String
#firstName:String
#lastName: String
KeanAlumni
-yearOfGraduation: int
- employmentStatus: String
+ KeanPerson()
+ KeanPerson(keanld: int, keanEmail:
String, firstName: String, lastName: String)
+ getKeanld(): int
+ getKeanEmail(): String
+getFirstName(): String
+ getLastName(): String
+ setFirstName(firstName: String): void
+ setLastName(lastName: String): void
+toString(): String
+getParkingRate(): double
+ KeanAlumni()
+ KeanAlumni(keanld: int, keanEmail: String,
firstName: String, lastName: String,
yearOfGraduation: int, employmentStatus: String)
+getYearOfGraduation(): int
+ setYearOfGraduation(yearOfGraduation: int): void
+toString(): String
+getParkingRate(): double
In this question, write Java code to Create and Test the superclass: Abstract KeanPerson and a subclass of the KeanPerson: KeanAlumni.
Task 1: Implement Abstract Class KeanPerson using UML (10 points)
• Four data fields
• Two constructors (1 default and 1 constructor with all…
Plz correct answer by best experts...??
Chapter 9 Solutions
Big Java, Binder Ready Version: Early Objects
Ch. 9.1 - Consider classes Manager and Employee. Which...Ch. 9.1 - What are the inheritance relationships between...Ch. 9.1 - Prob. 3SCCh. 9.1 - Prob. 4SCCh. 9.1 - Prob. 5SCCh. 9.2 - Prob. 6SCCh. 9.2 - Suppose the class Employee is declared as...Ch. 9.2 - Prob. 8SCCh. 9.2 - In the Manager class, provide the method header...Ch. 9.2 - Prob. 10SC
Ch. 9.3 - What is wrong with the following implementation of...Ch. 9.3 - What is wrong with the following implementation of...Ch. 9.3 - Look again at the implementation of the addChoice...Ch. 9.3 - In the Manager class of Self Check 7, override the...Ch. 9.3 - In the Manager class of Self Check 9, override the...Ch. 9.4 - Assuming SavingsAccount is a subclass of...Ch. 9.4 - Prob. 17SCCh. 9.4 - Declare an array quiz that can hold a mixture of...Ch. 9.4 - Prob. 19SCCh. 9.4 - Prob. 20SCCh. 9.5 - Prob. 21SCCh. 9.5 - Will the following code fragment compile? Will it...Ch. 9.5 - Prob. 23SCCh. 9.5 - Prob. 24SCCh. 9.5 - Prob. 25SCCh. 9 - Prob. 1RECh. 9 - Identify the superclass and subclass in each of...Ch. 9 - Prob. 3RECh. 9 - Which methods does the ChoiceQuestion class...Ch. 9 - Which methods does the SavingsAccount class in How...Ch. 9 - Prob. 6RECh. 9 - Suppose the class Sub extends the class Sandwich....Ch. 9 - Draw an inheritance diagram that shows the...Ch. 9 - Prob. 9RECh. 9 - What inheritance relationships would you establish...Ch. 9 - How does a cast such as (BankAccount) x differ...Ch. 9 - Prob. 12RECh. 9 - Implement a subclass of BankAccount called...Ch. 9 - Implement a subclass of BankAccount called...Ch. 9 - Reimplement the CheckingAccount class from How To...Ch. 9 - Add a class NumericQuestion to the question...Ch. 9 - Prob. 5PECh. 9 - Prob. 6PECh. 9 - Add a class AnyCorrectChoiceQuestion to the...Ch. 9 - Prob. 8PECh. 9 - Prob. 10PECh. 9 - Prob. 11PECh. 9 - Prob. 12PECh. 9 - Prob. 13PECh. 9 - Prob. 14PECh. 9 - Prob. 15PECh. 9 - Prob. 16PECh. 9 - Prob. 17PECh. 9 - Prob. 1PPCh. 9 - Prob. 2PPCh. 9 - Prob. 3PPCh. 9 - Prob. 4PPCh. 9 - Prob. 5PPCh. 9 - Prob. 6PPCh. 9 - Prob. 7PPCh. 9 - Prob. 8PP
Knowledge Booster
Similar questions
- Q3) using the following image matrix a- b- 12345 6 7 8 9 10 11 12 13 14 15 1617181920 21 22 23 24 25 Using direct chaotic one dimension method to convert the plain text to stego text (hello ahmed)? Using direct chaotic two-dimension method to convert the plain text to stego text?arrow_forward: The Multithreaded Cook In this lab, we'll practice multithreading. Using Semaphores for synchronization, implement a multithreaded cook that performs the following recipe, with each task being contained in a single Thread: 1. Task 1: Cut onions. a. Waits for none. b. Signals Task 4 2. Task 2: Mince meat. a. Waits for none b. Signals Task 4 3. Task 3: Slice aubergines. a. Waits for none b. Signals Task 6 4. Task 4: Make sauce. a. Waits for Task 1, and 2 b. Signals Task 6 5. Task 5: Finished Bechamel. a. Waits for none b. Signals Task 7 6. Task 6: Layout the layers. a. Waits for Task 3, and 4 b. Signals Task 7 7. Task 7: Put Bechamel and Cheese. a. Waits for Task 5, and 6 b. Signals Task 9 8. Task 8: Turn on oven. a. Waits for none b. Signals Task 9 9. Task 9: Cook. a. Waits for Task 7, and 8 b. Signals none At the start of each task (once all Semaphores have been acquired), print out a string of the task you are starting, sleep for 2-11 seconds, then print out a string saying that you…arrow_forwardProgramming Problems 9.28 Assume that a system has a 32-bit virtual address with a 4-KB page size. Write a C program that is passed a virtual address (in decimal) on the command line and have it output the page number and offset for the given address. As an example, your program would run as follows: ./addresses 19986 Your program would output: The address 19986 contains: page number = 4 offset = 3602 Writing this program will require using the appropriate data type to store 32 bits. We encourage you to use unsigned data types as well. Programming Projects Contiguous Memory Allocation In Section 9.2, we presented different algorithms for contiguous memory allo- cation. This project will involve managing a contiguous region of memory of size MAX where addresses may range from 0 ... MAX - 1. Your program must respond to four different requests: 1. Request for a contiguous block of memory 2. Release of a contiguous block of memory 3. Compact unused holes of memory into one single block 4.…arrow_forward
- using r languagearrow_forwardProgramming Problems 9.28 Assume that a system has a 32-bit virtual address with a 4-KB page size. Write a C program that is passed a virtual address (in decimal) on the command line and have it output the page number and offset for the given address. As an example, your program would run as follows: ./addresses 19986 Your program would output: The address 19986 contains: page number = 4 offset = 3602 Writing this program will require using the appropriate data type to store 32 bits. We encourage you to use unsigned data types as well. Programming Projects Contiguous Memory Allocation In Section 9.2, we presented different algorithms for contiguous memory allo- cation. This project will involve managing a contiguous region of memory of size MAX where addresses may range from 0 ... MAX - 1. Your program must respond to four different requests: 1. Request for a contiguous block of memory 2. Release of a contiguous block of memory 3. Compact unused holes of memory into one single block 4.…arrow_forwardusing r languagearrow_forward
- Write a function to compute a Monte Carlo estimate of the Beta(3, 3) cdf, and use the function to estimate F(x) for x = 0.1,0.2,...,0.9. Compare the estimates with the values returned by the pbeta function in R.arrow_forwardWrite a function to compute a Monte Carlo estimate of the Gamma(r = 3, λ = 2) cdf, and use the function to estimate F(x) for x = 0.2, 0.4, . . . , 2.0. Compare the estimates with the values returned by the pgamma function in R.arrow_forwardusing r languagearrow_forward
- using r languagearrow_forwardYou are given a class that processes purchases for an online store. The class receives calls to: • Retrieve the prices for items from a database • Record the sold items • Update the database • Refresh the webpage a. What architectural pattern is suitable for this scenario? Illustrate your answer by drawing a model for the solution, showing the method calls/events. b. Comment on how applying this pattern will impact the modifiability of the system. c. Draw a sequence diagram for the update operation.arrow_forwardThe images I have uploaded are the part 1 to 4 and questions below are continue on the questions uploaded 5. C++ Class Template with Method Stubs #pragma once #include <iostream> #include <string> #include <stdexcept> #include <vector> template <typename T> class HashTable { private: struct Entry { std::string key; T value; bool isOccupied; bool isDeleted; Entry() : key(""), value(), isOccupied(false), isDeleted(false) {} }; Entry* table; size_t capacity; size_t size; double loadFactorThreshold; size_t customHash(const std::string& key) const { size_t hash = 5381; for (char c : key) { hash = ((hash << 5) + hash) + c; } return hash; } size_t probe(const std::string& key, bool forInsert = false) const; void resize(); public: // Constructor HashTable(size_t initialCapacity = 101); // Big…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education

Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education

Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON

Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON

C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON

Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning

Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education